Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains...Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains, particularly agriculture, to maximize their potential, it is crucial to identify emerging priority areas and existing research gaps for future research agendas. As a contribution to this effort, this paper employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to review the state-of-the-art in the field of climate services for disaster risk management. A comprehensive search across five literature databases combined with a snowball search method using ResearchRabbit was conducted and yielded 242 peer-reviewed articles, book sections, and reports over 2013-2023 after the screening process. The analysis revealed flood, drought, and food insecurity as major climate-related disasters addressed in the reviewed literature. Major climate services addressed included early warning systems, (sub)seasonal forecasts and impact-based warnings. Grounded in the policy processes’ theoretical perspective, the main focus identified and discussed three prevailing policy-oriented priority areas: 1) development of climate services, 2) use-adoption-uptake, and 3) evaluation of climate services. In response to the limitations of the prevalent supply-driven and top-down approach to climate services promotion, co-production emerges as a cross-cutting critical aspect of the identified priority areas. Despite the extensive research in the field, more attention is needed, particularly pronounced in the science-policy interface perspective, which in practice bridges scientific knowledge and policy decisions for effective policy processes. This perspective offers a valuable analytical lens as an entry point for further investigation. Hence, future research agendas would generate insightful evidence by scrutinizing this critical aspect given its importance to institutions and climate services capacity, to better understand intricate facets of the development and the integration of climate services into disaster risk management.展开更多
With the development of society and economy and increasing awareness of people's diet and health care,the demand for waxy corn and its processed products has been rising. At present,the planting of waxy corn in Ch...With the development of society and economy and increasing awareness of people's diet and health care,the demand for waxy corn and its processed products has been rising. At present,the planting of waxy corn in Chongqing is taking shape,but the waxy corn processing is still in the initial stage with smaller enterprise scale and fewer processing product variety. Based on the analysis of the development advantages and disadvantages of waxy corn processing industry in Chongqing,this paper brings forward the development ideas and strategies of Chongqing waxy corn processing industry from three aspects of production,processing and policy.展开更多
The maintenance model of simple repairable system is studied.We assume that there are two types of failure,namely type Ⅰ failure(repairable failure)and type Ⅱ failure(irrepairable failure).As long as the type Ⅰ fai...The maintenance model of simple repairable system is studied.We assume that there are two types of failure,namely type Ⅰ failure(repairable failure)and type Ⅱ failure(irrepairable failure).As long as the type Ⅰ failure occurs,the system will be repaired immediately,which is failure repair(FR).Between the(n-1)th and the nth FR,the system is supposed to be preventively repaired(PR)as the consecutive working time of the system reaches λ^(n-1) T,where λ and T are specified values.Further,we assume that the system will go on working when the repair is finished and will be replaced at the occurrence of the Nth type Ⅰ failure or the occurrence of the first type Ⅱ failure,whichever occurs first.In practice,the system will degrade with the increasing number of repairs.That is,the consecutive working time of the system forms a decreasing generalized geometric process(GGP)whereas the successive repair time forms an increasing GGP.A simple bivariate policy(T,N)repairable model is introduced based on GGP.The alternative searching method is used to minimize the cost rate function C(N,T),and the optimal(T,N)^(*) is obtained.Finally,numerical cases are applied to demonstrate the reasonability of this model.展开更多
This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models...This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management.展开更多
Data privacy laws require service providers to inform their customers on how user data is gathered,used,protected,and shared.The General Data ProtectionRegulation(GDPR)is a legal framework that provides guidelines for...Data privacy laws require service providers to inform their customers on how user data is gathered,used,protected,and shared.The General Data ProtectionRegulation(GDPR)is a legal framework that provides guidelines for collecting and processing personal information from individuals.Service providers use privacy policies to outline the ways an organization captures,retains,analyzes,and shares customers’data with other parties.These policies are complex and written using legal jargon;therefore,users rarely read them before accepting them.There exist a number of approaches to automating the task of summarizing privacy policies and assigning risk levels.Most of the existing approaches are not GDPR compliant and use manual annotation/labeling of the privacy text to assign risk level,which is time-consuming and costly.We present a framework that helps users see not only data practice policy compliance with GDPR but also the risk levels to privacy associated with accepting that policy.The main contribution of our approach is eliminating the overhead cost of manual annotation by using the most frequent words in each category to create word-bags,which are used with Regular Expressions and Pointwise Mutual Information scores to assign risk levels that comply with the GDPR guidelines for data protection.We have also developed a web-based application to graphically display risk level reports for any given online privacy policy.Results show that our approach is not only consistent with GDPR but performs better than existing approaches by successfully assigning risk levels with 95.1%accuracy after assigning data practice categories with an accuracy rate of 79%.展开更多
隐私政策文档声明了应用程序需要获取的隐私信息,但不能保证清晰且完全披露应用获取的隐私信息类型,目前对应用实际敏感行为与隐私政策一致性分析的研究仍存在不足。针对上述问题,提出一种Android应用敏感行为与隐私政策一致性分析方法...隐私政策文档声明了应用程序需要获取的隐私信息,但不能保证清晰且完全披露应用获取的隐私信息类型,目前对应用实际敏感行为与隐私政策一致性分析的研究仍存在不足。针对上述问题,提出一种Android应用敏感行为与隐私政策一致性分析方法。在隐私政策分析阶段,基于Bi-GRU-CRF(Bi-directional Gated Recurrent Unit Conditional Random Field)神经网络,通过添加自定义标注库对模型进行增量训练,实现对隐私政策声明中的关键信息的提取;在敏感行为分析阶段,通过对敏感应用程序接口(API)调用进行分类、对输入敏感源列表中已分析过的敏感API调用进行删除,以及对已提取过的敏感路径进行标记的方法来优化IFDS(Interprocedural,Finite,Distributive,Subset)算法,使敏感行为分析结果与隐私政策描述的语言粒度相匹配,并且降低分析结果的冗余,提高分析效率;在一致性分析阶段,将本体之间的语义关系分为等价关系、从属关系和近似关系,并据此定义敏感行为与隐私政策一致性形式化模型,将敏感行为与隐私政策一致的情况分为清晰的表述和模糊的表述,将不一致的情况分为省略的表述、不正确的表述和有歧义的表述,最后根据所提基于语义相似度的一致性分析算法对敏感行为与隐私政策进行一致性分析。实验结果表明,对928个应用程序进行分析,在隐私政策分析正确率为97.34%的情况下,51.4%的Android应用程序存在应用实际敏感行为与隐私政策声明不一致的情况。展开更多
文摘Climate services (CS) are crucial for mitigating and managing the impacts and risks associated with climate-induced disasters. While evidence over the past decade underscores their effectiveness across various domains, particularly agriculture, to maximize their potential, it is crucial to identify emerging priority areas and existing research gaps for future research agendas. As a contribution to this effort, this paper employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to review the state-of-the-art in the field of climate services for disaster risk management. A comprehensive search across five literature databases combined with a snowball search method using ResearchRabbit was conducted and yielded 242 peer-reviewed articles, book sections, and reports over 2013-2023 after the screening process. The analysis revealed flood, drought, and food insecurity as major climate-related disasters addressed in the reviewed literature. Major climate services addressed included early warning systems, (sub)seasonal forecasts and impact-based warnings. Grounded in the policy processes’ theoretical perspective, the main focus identified and discussed three prevailing policy-oriented priority areas: 1) development of climate services, 2) use-adoption-uptake, and 3) evaluation of climate services. In response to the limitations of the prevalent supply-driven and top-down approach to climate services promotion, co-production emerges as a cross-cutting critical aspect of the identified priority areas. Despite the extensive research in the field, more attention is needed, particularly pronounced in the science-policy interface perspective, which in practice bridges scientific knowledge and policy decisions for effective policy processes. This perspective offers a valuable analytical lens as an entry point for further investigation. Hence, future research agendas would generate insightful evidence by scrutinizing this critical aspect given its importance to institutions and climate services capacity, to better understand intricate facets of the development and the integration of climate services into disaster risk management.
基金Supported by Science and Technology Service Platform Project of Chongqing Science and Technology Commission(cstc2015ptfw-ggfw80001)Agricultural Development Project of Chongqing Academy of Agricultural Sciences(Research and Demonstration of the Key Technology in Adjusting Corn Planting Structure)Soft Science Project of Jiulongpo District Science and Technology Commission in Chongqing Municipality(Study on the Industrialization Layout and Development Strategy of Grain Reform in Chongqing)
文摘With the development of society and economy and increasing awareness of people's diet and health care,the demand for waxy corn and its processed products has been rising. At present,the planting of waxy corn in Chongqing is taking shape,but the waxy corn processing is still in the initial stage with smaller enterprise scale and fewer processing product variety. Based on the analysis of the development advantages and disadvantages of waxy corn processing industry in Chongqing,this paper brings forward the development ideas and strategies of Chongqing waxy corn processing industry from three aspects of production,processing and policy.
基金supported by the National Natural Science Foundation of China(61573014)the Fundamental Research Funds for the Central Universities(JB180702).
文摘The maintenance model of simple repairable system is studied.We assume that there are two types of failure,namely type Ⅰ failure(repairable failure)and type Ⅱ failure(irrepairable failure).As long as the type Ⅰ failure occurs,the system will be repaired immediately,which is failure repair(FR).Between the(n-1)th and the nth FR,the system is supposed to be preventively repaired(PR)as the consecutive working time of the system reaches λ^(n-1) T,where λ and T are specified values.Further,we assume that the system will go on working when the repair is finished and will be replaced at the occurrence of the Nth type Ⅰ failure or the occurrence of the first type Ⅱ failure,whichever occurs first.In practice,the system will degrade with the increasing number of repairs.That is,the consecutive working time of the system forms a decreasing generalized geometric process(GGP)whereas the successive repair time forms an increasing GGP.A simple bivariate policy(T,N)repairable model is introduced based on GGP.The alternative searching method is used to minimize the cost rate function C(N,T),and the optimal(T,N)^(*) is obtained.Finally,numerical cases are applied to demonstrate the reasonability of this model.
文摘This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma (6σ) framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security policy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management.
文摘Data privacy laws require service providers to inform their customers on how user data is gathered,used,protected,and shared.The General Data ProtectionRegulation(GDPR)is a legal framework that provides guidelines for collecting and processing personal information from individuals.Service providers use privacy policies to outline the ways an organization captures,retains,analyzes,and shares customers’data with other parties.These policies are complex and written using legal jargon;therefore,users rarely read them before accepting them.There exist a number of approaches to automating the task of summarizing privacy policies and assigning risk levels.Most of the existing approaches are not GDPR compliant and use manual annotation/labeling of the privacy text to assign risk level,which is time-consuming and costly.We present a framework that helps users see not only data practice policy compliance with GDPR but also the risk levels to privacy associated with accepting that policy.The main contribution of our approach is eliminating the overhead cost of manual annotation by using the most frequent words in each category to create word-bags,which are used with Regular Expressions and Pointwise Mutual Information scores to assign risk levels that comply with the GDPR guidelines for data protection.We have also developed a web-based application to graphically display risk level reports for any given online privacy policy.Results show that our approach is not only consistent with GDPR but performs better than existing approaches by successfully assigning risk levels with 95.1%accuracy after assigning data practice categories with an accuracy rate of 79%.
文摘隐私政策文档声明了应用程序需要获取的隐私信息,但不能保证清晰且完全披露应用获取的隐私信息类型,目前对应用实际敏感行为与隐私政策一致性分析的研究仍存在不足。针对上述问题,提出一种Android应用敏感行为与隐私政策一致性分析方法。在隐私政策分析阶段,基于Bi-GRU-CRF(Bi-directional Gated Recurrent Unit Conditional Random Field)神经网络,通过添加自定义标注库对模型进行增量训练,实现对隐私政策声明中的关键信息的提取;在敏感行为分析阶段,通过对敏感应用程序接口(API)调用进行分类、对输入敏感源列表中已分析过的敏感API调用进行删除,以及对已提取过的敏感路径进行标记的方法来优化IFDS(Interprocedural,Finite,Distributive,Subset)算法,使敏感行为分析结果与隐私政策描述的语言粒度相匹配,并且降低分析结果的冗余,提高分析效率;在一致性分析阶段,将本体之间的语义关系分为等价关系、从属关系和近似关系,并据此定义敏感行为与隐私政策一致性形式化模型,将敏感行为与隐私政策一致的情况分为清晰的表述和模糊的表述,将不一致的情况分为省略的表述、不正确的表述和有歧义的表述,最后根据所提基于语义相似度的一致性分析算法对敏感行为与隐私政策进行一致性分析。实验结果表明,对928个应用程序进行分析,在隐私政策分析正确率为97.34%的情况下,51.4%的Android应用程序存在应用实际敏感行为与隐私政策声明不一致的情况。